Ask the Experts

Penetration Testing

As our developers incorporate more and more third-party software components and partner APIs that we don't have direct control over, how do we test for third-party application security?
Continue Reading

It can be hard to keep pace with the various types of security testing required in today's complex and often dangerous Web environment. In this response, expert John Overbaugh explains some of the most common and necessary security testing ...
Continue Reading

Hackers are increasingly sophisticated in how they exploit weaknesses in network and Web application security. In this response, expert John Overbaugh explains the importance of penetration testing and how to ensure comprehensive security of your ...
Continue Reading

Robin Goldsmith takes another stab at this question of functional vs non-functional requirements in this expert response. According to Goldsmith the difference lies in the applications need and what it is intended for.
Continue Reading

Knowing how to write requirements documentation is crucial when developing and tracking the completion of software. Expert Robin Goldsmith goes over how to write SRS documents and how to distinguish them in this expert response.
Continue Reading